Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
EDUCAUSE Review | 3 |
Author
Davis, Jim | 1 |
Gawelek, Mary Ann | 1 |
Komarny, Phil | 1 |
Rocchio, Rosemary A. | 1 |
Spataro, Mary | 1 |
Voloudakis, John | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Information Analyses | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Location
California | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Davis, Jim; Rocchio, Rosemary A. – EDUCAUSE Review, 2011
Mobile use of the Internet is on target to surpass fixed use by 2014. Three-fourths of all college/university students have purchased or intend to purchase an Internet-enabled handheld device within the next year. The smartphone market is changing almost monthly. Attempting to manage even just one or a few "devices" is becoming a lost…
Descriptors: Computer System Design, Internet, Educational Technology, Technological Advancement
Gawelek, Mary Ann; Spataro, Mary; Komarny, Phil – EDUCAUSE Review, 2011
Along with their students, faculty have become co-learners and pioneers in the classroom. With no models to work from, they have had to explore, practice, and discover the iPad's potential for expanding learning. Given the recent and rapidly growing access to a dazzling array of intellectual technologies, faculty and staff at Seton Hill, a liberal…
Descriptors: Learner Engagement, Computer Uses in Education, Access to Information, Creative Thinking
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security